A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http:///a.php in a phishing email. To prevent other computers from being infected by the same malware variation, the analyst should create a rule on the:
A. email server that automatically deletes attached executables.
B. IDS to match the malware sample.
C. proxy to block all connections to
D. firewall to block connection attempts to dynamic DNS hosts.
Answer: C. proxy to block all connections to
You might also like to view...
What standarizes sounds and video format so plug-ins like Flash are no longer needed?
A. SMTP B. IMAP4 C. JavaScript D. HTML5
The ________ slide layout is used for bulleted lists or to insert objects such as a table or video
Fill in the blank(s) with correct word
Which of the following analyzes, develops, and supports the functionality of a website?
A. systems analyst B. database designer? C. systems programmer D. web developer?
If you forget the password of an encrypted document, the file can still be reopened.
Answer the following statement true (T) or false (F)